![ZyXEL Communications VANTAGE CNM 2.0 - Скачать руководство пользователя страница 158](http://html.mh-extra.com/html/zyxel-communications/vantage-cnm-2-0/vantage-cnm-2-0_user-manual_945619158.webp)
Vantage CNM 2.0 User’s Guide
161
Chapter 11 Configuration > VPN
11.2.2 Manual VPN Tunnel
Select Manual from
Figure 74 on page 157
to proceed to the next screen.
Encapsulation
In Transport mode, the IP packet contains the security protocol (AH or
ESP) located after the original IP header and options, but before any
upper layer protocols contained in the packet (such as TCP and UDP).
With ESP, protection is applied only to the upper layer protocols contained
in the packet. The IP header information and options are not used in the
authentication process. Therefore, the originating IP address cannot be
verified for integrity against the data.
With the use of AH as the security protocol, protection is extended forward
into the IP header to verify the integrity of the entire packet by use of
portions of the original IP header in the hashing process. Tunnel mode
encapsulates the entire IP packet to transmit it securely. Tunnel mode is
required for gateway services to provide access to internal systems.
Tunnel mode is fundamentally an IP tunnel with authentication and
encryption. This is the most common mode of operation
Encryption Algorithm
Select an encryption algorithm from the pull-down menu. You can select
either DES or 3DES. 3DES is more powerful but increases latency.
Authentication Algorithm
The Authentication Algorithms, HMAC-MD5 (RFC 2403) and HMAC-SHA-
1 (RFC 2404, provide an authentication mechanism for the AH and ESP
protocols. Select MD5 for minimal security and SHA-1 for maximum
security.
MD5 (Message Digest 5) produces a 128-bit digest to authenticate packet
data. SHA-1 (Secure Hash Algorithm) produces a 160-bit digest to
authenticate packet data.
SA Life Time (Seconds)
Define the length of time before an IKE Security Association automatically
renegotiates in this field. It may range from 60 to 3,000,000 seconds
(almost 35 days).
A short SA Life Time increases security by forcing the two VPN gateways
to update the encryption and authentication keys. However, every time the
VPN tunnel renegotiates, all users accessing remote resources are
temporarily disconnected.
Perfect Forward Secrecy
(PFS)
Choose whether to enable Perfect Forward Secrecy (PFS) using Diffie-
Hellman public-key cryptography. Enabling PFS means that the key is
transient. A brand new key using a new Diffie-Hellman exchange replaces
the key for each new IPSec SA.
With PFS enabled, if one key is compromised, previous and subsequent
keys are not compromised, because subsequent keys are not derived
from previous keys. The (time-consuming) Diffie-Hellman exchange is the
trade-off for this extra security.
Disabling PFS means new authentication and encryption keys are derived
from the same root secret (which may have security implications in the
long run) but allows faster SA setup (by bypassing the Diffie-Hellman key
exchange).
Apply
Click Apply to apply your changes in this screen.
Cancel
Click Cancel to close this screen without applying any changes.
Table 57 Configuration > VPN > Tunnel IPSec Detail (continued)
LABEL
DESCRIPTION
Содержание VANTAGE CNM 2.0 -
Страница 30: ...Vantage CNM 2 0 User s Guide 33 Chapter 1 Introducing Vantage ...
Страница 40: ...Vantage CNM 2 0 User s Guide 43 Chapter 2 GUI Introduction ...
Страница 66: ...Vantage CNM 2 0 User s Guide 69 Chapter 4 Configuration Select Device BB General ...
Страница 78: ...Vantage CNM 2 0 User s Guide 81 Chapter 5 Configuration LAN ...
Страница 96: ...Vantage CNM 2 0 User s Guide 99 Chapter 7 Configuration DMZ ...
Страница 126: ...Vantage CNM 2 0 User s Guide 129 Chapter 8 Configuration WAN ...
Страница 140: ...Vantage CNM 2 0 User s Guide 143 Chapter 9 Configuration NAT ...
Страница 144: ...Vantage CNM 2 0 User s Guide 147 Chapter 10 Configuration Static Route ...
Страница 162: ...Vantage CNM 2 0 User s Guide 165 Chapter 11 Configuration VPN ...
Страница 182: ...Vantage CNM 2 0 User s Guide 185 Chapter 12 Configuration Firewall ...
Страница 188: ...Vantage CNM 2 0 User s Guide 191 Chapter 13 Configuration Device Log ...
Страница 236: ...Vantage CNM 2 0 User s Guide 239 Chapter 18 Other System Screens ...
Страница 239: ...Vantage CNM 2 0 User s Guide Chapter 19 Monitor Alarms 242 Figure 132 Monitor Current Alarms ...
Страница 242: ...Vantage CNM 2 0 User s Guide 245 Chapter 19 Monitor Alarms ...
Страница 248: ...Vantage CNM 2 0 User s Guide 251 Chapter 20 Other Monitor Screens ...
Страница 254: ...Vantage CNM 2 0 User s Guide 257 Figure 151 WFTPD Pro Log On ...
Страница 266: ...Vantage CNM 2 0 User s Guide 269 ...
Страница 274: ...Vantage CNM 2 0 User s Guide 277 ...
Страница 286: ...Vantage CNM 2 0 User s Guide 289 ...
Страница 288: ...Vantage CNM 2 0 User s Guide 291 ...
Страница 291: ...Vantage CNM 2 0 User s Guide 294 Figure 181 ESS Provides Campus Wide Coverage ...
Страница 292: ...Vantage CNM 2 0 User s Guide 295 ...
Страница 312: ...Vantage CNM 2 0 User s Guide 315 ...